Cargando…
Security of six-state quantum key distribution protocol with threshold detectors
The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and a...
Autores principales: | Kato, Go, Tamaki, Kiyoshi |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4957092/ https://www.ncbi.nlm.nih.gov/pubmed/27443610 http://dx.doi.org/10.1038/srep30044 |
Ejemplares similares
-
All-photonic intercity quantum key distribution
por: Azuma, Koji, et al.
Publicado: (2015) -
Tight security bounds for decoy-state quantum key distribution
por: Yin, Hua-Lei, et al.
Publicado: (2020) -
Measurement-device-independent quantum key distribution with leaky sources
por: Wang, Weilong, et al.
Publicado: (2021) -
Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol
por: Mizutani, Akihiro, et al.
Publicado: (2014) -
Security of quantum key distribution with multiphoton components
por: Yin, Hua-Lei, et al.
Publicado: (2016)